Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2015_22_6_a0, author = {D. Ju. Chaly and E. S. Nikitin and E. Ju. Antoshina and V. A. Sokolov}, title = {End-to-end information flow security model for~software-defined networks}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {735--749}, publisher = {mathdoc}, volume = {22}, number = {6}, year = {2015}, language = {en}, url = {http://geodesic.mathdoc.fr/item/MAIS_2015_22_6_a0/} }
TY - JOUR AU - D. Ju. Chaly AU - E. S. Nikitin AU - E. Ju. Antoshina AU - V. A. Sokolov TI - End-to-end information flow security model for~software-defined networks JO - Modelirovanie i analiz informacionnyh sistem PY - 2015 SP - 735 EP - 749 VL - 22 IS - 6 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2015_22_6_a0/ LA - en ID - MAIS_2015_22_6_a0 ER -
%0 Journal Article %A D. Ju. Chaly %A E. S. Nikitin %A E. Ju. Antoshina %A V. A. Sokolov %T End-to-end information flow security model for~software-defined networks %J Modelirovanie i analiz informacionnyh sistem %D 2015 %P 735-749 %V 22 %N 6 %I mathdoc %U http://geodesic.mathdoc.fr/item/MAIS_2015_22_6_a0/ %G en %F MAIS_2015_22_6_a0
D. Ju. Chaly; E. S. Nikitin; E. Ju. Antoshina; V. A. Sokolov. End-to-end information flow security model for~software-defined networks. Modelirovanie i analiz informacionnyh sistem, Tome 22 (2015) no. 6, pp. 735-749. http://geodesic.mathdoc.fr/item/MAIS_2015_22_6_a0/
[1] E. Al-Shaer, S. Al-Haj, “FlowChecker: configuration analysis and verification of federated OpenFlow infrastructures”, SafeConfig 2010 : 2nd ACM Workshop on Assurable and Usable Security Configuration (October 4, 2010, Chicago, IL, USA), 37–44
[2] C. J. Anderson et al., “NetKAT: semantic foundations for networks”, POPL 2014: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (January 22–24, 2014, San Diego, USA), 113–126 | Zbl
[3] E. Ju. Antoshina et al., “A translator with a security static analysis feature of an information flow for a simple programming language”, Autom. Control and Comp. Sciences, 48:7 (2014), 589–593 | DOI
[4] M. Casado, N. Foster, A. Guha, “Abstractions for software-defined networks”, Communications of the ACM, 57:10 (2014), 86–95 | DOI
[5] M. Casado et al., “Ethane: taking control of the enterprise”, ACM SIGCOMM 2007: Data Communications Festival (Augest 27–31, 2007, Kyoto, Japan)
[6] N. Foster et al., “Frenetic: a network programming language”, The 16th ACM SIGPLAN International Conference on Functional Programming (September 19–21, 2011, Tokyo, Japan), 279–291 | Zbl
[7] S. Gutz et al., “Splendid isolation: a slice abstraction for software-defined networks”, ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) (August 13, 2012, Helsinki, Finland), 2012, 79–84
[8] C.-Y. Hong et al., “Achieving high utilization with software-driven WAN”, ACM SIGCOMM 2013 (August 12 – 16, 2013, Hong Kong, China)
[9] N. McKeown et al., “OpenFlow: enabling innovation in campus networks”, ACM Comp. Comm. Review, 38:2 (2008), 69–74 | DOI
[10] Open Networking Foundation, OpenFlow switch specification v. 1.4.0, (Last accessed: 10.05.2015) https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.4.0.pdf
[11] A. Sabelfeld, A.C. Myers, “Language-based information-flow security”, IEEE Journal on Selected Areas in Communications, 21 (2003), 5–19 | DOI
[12] R. Smeliansky, “SDN for network security”, Modern Networking Technologies: SDN NFV — The Next Generation of Computational Infrastructure (October 28–29, 2014, Moscow, Russia), 155–159
[13] D. Zhang et al., Jif: Java+ information flow, (Last accessed: 10.05.2015) http://www.cs.cornell.edu/jif/
[14] D. Zhang et al., “A Hardware Design Language for Timing-Sensitive Information-Flow Security”, ASPLOS 2015: Architectural Support for Programming Languages and Operating Systems (Mar 14–18, 2015, Istanbul, Turkey)
[15] D. Hedin et al., “JSFlow: Tracking Information Flow in JavaScript and its APIs”, The 29th Symposium On Applied Computing (March 24–28, 2014, Gyeongju, Korea), 1663–1671
[16] O. Arden et al., “Sharing Mobile Code Securely With Information Flow Control”, IEEE Symp. on Security and Privacy (SP), 2012, 191–205
[17] A. Cheung et al., “Using Program Analysis to Improve Database Applications”, IEEE Data Eng. Bull., 37:1 (2014), 48–59